Author: Dalit Naor

Publications

Publication period start: 2003
Number of co-authors: 1

Co-authors

Number of publications with favourite co-authors
Moni Naor
1

Productive Colleagues

Most productive colleagues in number of publications
Moni Naor
4

Publications

Naor, Dalit, Naor, Moni (2003): Protecting Cryptographic Keys: The Trace-and-Revoke Approach. In IEEE Computer, 36 (7) pp. 47-53. https://csdl.computer.org/comp/mags/co/2003/07/r7047abs.htm

New to UX Design? We’re giving you a free ebook!

The Basics of User Experience Design

Download our free ebook The Basics of User Experience Design to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,406 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We’re Giving You a Free ebook!

The Basics of User Experience Design

Download our free ebook The Basics of User Experience Design to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,406 designers enjoy our newsletter—sure you don’t want to receive it?